| Mimic defense: a designed-in cybersecurity defense framework |
15 |
| Least lion optimisation algorithm (LLOA) based secret key generation for privacy preserving association rule hiding |
10 |
| Malware classification based on API calls and behaviour analysis |
8 |
| Network intrusion detection algorithm based on deep neural network |
8 |
| Threshold verifiable multi-secret sharing based on elliptic curves and Chinese remainder theorem |
7 |
| Division cryptanalysis of block ciphers with a binary diffusion layer |
7 |
| New algorithms for the unbalanced generalised birthday problem |
7 |
| Detection of double compression in HEVC videos based on TU size and quantised DCT coefficients |
5 |
| Privacy preserving big data mining: association rule hiding using fuzzy logic approach |
5 |
| Attribute-based broadcast encryption scheme for lightweight devices |
5 |
| Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control |
4 |
| Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine |
4 |
| Dynamic asymmetric group key agreement protocol with traitor traceability |
4 |
| Detecting new generations of threats using attribute-based attack graphs |
4 |
| Leveraging deep neural networks for anomaly-based web application firewall |
4 |
| Public key authenticated encryption with keyword search: revisited |
3 |
| Dynamic API call sequence visualisation for malware classification |
3 |
| Detecting LDoS attack bursts based on queue distribution |
3 |
| Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation |
3 |
| Hybrid intelligent phishing website prediction using deep neural networks with genetic algorithm-based feature selection and weighting |
3 |
| Efficient identity-based blind message recovery signature scheme from pairings |
3 |
| Database authentication watermarking scheme in encrypted domain |
3 |
| Parallel multiple pattern matching schemes based on cuckoo filter for deep packet inspection on graphics processing units |
2 |
| Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models |
2 |
| Multi-objective auto-regressive whale optimisation for traffic-aware routing in urban VANET |
2 |
| Dynamical model for individual defence against cyber epidemic attacks |
2 |
| Identity-based encryption resilient to continuous key leakage |
2 |
| Privacy preserving weighted similarity search scheme for encrypted data |
2 |
| Secure data storage and intrusion detection in the cloud using MANN and dual encryption through various attacks |
2 |
| Analysis of dynamic code updating in Android with security perspective |
2 |
| Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic |
1 |
| Fast Montgomery modular multiplier for Rivest-Shamir-Adleman cryptosystem |
1 |
| HAP: detection of HTTP flooding attacks in cloud using diffusion map and affinity propagation clustering |
1 |
| Provably secure certificateless aggregate signature scheme with designated verifier in an improved security model |
1 |
| Event reconstruction using temporal pattern of file system modification |
1 |
| How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes |
1 |
| PriVeto: a fully private two-round veto protocol |
1 |
| Dynamic reencryption of return addresses |
1 |
| Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC |
1 |
| HPCgnature: a hardware-based application-level intrusion detection system |
1 |
| Costly freeware: a systematic analysis of abuse in download portals |
1 |
| Security evaluation and design elements for a class of randomised encryptions |
1 |
| Smartphone passcode prediction |
1 |
| Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0 |
1 |
| Linear complexity of Legendre-polynomial quotients |
1 |
| Method for measuring the privacy level of pre-published dataset |
1 |
| OPEXA: analyser assistant for detecting over-privileged extensions |
1 |
| Vulnerability modelling of crypto-chips against scan-based attacks |
1 |
| Implementation of single-packet hybrid IP traceback for IPv4 and IPv6 networks |
1 |
| Securing RSA against power analysis attacks through non-uniform exponent partitioning with randomisation |
1 |